Compare VPN Tracker Pro with VPN Tracker

We offer two different versions of VPN Tracker to fit your requirements. Find out which version is right for you.

VPN Tracker

VPN Tracker is designed for individual users and for end users in corporate environments. It’s perfect for getting connected to an office or home network.

VPN Tracker Pro

VPN Tracker Pro adds advanced features for consultants, network admins and IT experts. VPN Tracker Pro is a great asset if you are a consultant, a system or network administrator, or are working with multiple VPN connections:

Export VPN connections for yourself and other users.

Scan the remote network for services or to assist users.

Connect to multiple VPNs at the same time.

Manage a large number of VPNs using search, a condensed layout, and connection groups

Configure your Mac as a router to provide the entire network with a VPN tunnel using Network to Network connections.

Note: With the optional Protection Plan, you can transfer your current VPN Tracker to every future upgrade at no extra cost. The VPN Tracker Protection Plan runs 36 months, with the possibility to renew at any time.

VPN Technologies

VPN Standards

IPsec VPN

Access OS X L2TP and PPTP connections in VPN Tracker Pro

Automatic Configuration

Mode Config (NETGEAR, Juniper Networks ...)

Cisco EasyVPN

WatchGuard Mobile User VPN

SonicWALL Simple Client Provisioning

SonicWALL DHCP over VPN

Networking

Host-to-Network (Split-Tunneling)

Host-to-Everywhere (Tunnel All Traffic)

Host-to-Host

Network-to-Network (requires VPN Tracker 8 Pro)

Remote DNS

Reverse Remote DNS

IPv6

Security

Encryption Algorithms

AES-256, AES-192, AES-128 encryption

3DES, DES, DES-IV64, DES-IV32

Hash Algorithms

SHA-2 (SHA-256, SHA-384, SHA-512)

SHA-1

MD5

Diffie-Hellman (DH) Key Exchange

Groups 14 to 18 (up to 8192 bit)

Group 5 (1536 bit)

Group 2 (1024 bit)

Group 1 (768 bit)

Authentication

Pre-shared keys

RSA X.509 certificates

Smart cards and PKI tokens

Extended Authentication (XAUTH)

Support for authenticator tokens (RSA SecurID, CryptoCard, etc.) through XAUTH